Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 02:52
Static task
static1
Behavioral task
behavioral1
Sample
f50379988920d3878813f2e010e20939_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f50379988920d3878813f2e010e20939_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f50379988920d3878813f2e010e20939_JaffaCakes118.html
-
Size
35KB
-
MD5
f50379988920d3878813f2e010e20939
-
SHA1
6d79bf87b7d08c80622053e27cbee4b593ae8b55
-
SHA256
157c24cbd7b0f9079f5232f785d0f4da47cc4bb1eeeaaf1ee0e88aa84d7073df
-
SHA512
a4690686387337db8c794c96b908442b2be40ee40e6b6f58e38778d75137e41ba68b45d8f1b6fd8e4fa04fcd576f84518f4ba45cba071eaca3bc098b27389529
-
SSDEEP
768:zwx/MDTH8G88hARcZPX7E1XnXrFLxNLlDNoPqkPTHlnkM3Gr6T/uJxF6lJtxU6lL:Q/3bJxNV4u0Sx/x8wK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2240 msedge.exe 2240 msedge.exe 4788 msedge.exe 4788 msedge.exe 5096 identity_helper.exe 5096 identity_helper.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4788 wrote to memory of 556 4788 msedge.exe 82 PID 4788 wrote to memory of 556 4788 msedge.exe 82 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 3612 4788 msedge.exe 83 PID 4788 wrote to memory of 2240 4788 msedge.exe 84 PID 4788 wrote to memory of 2240 4788 msedge.exe 84 PID 4788 wrote to memory of 3436 4788 msedge.exe 85 PID 4788 wrote to memory of 3436 4788 msedge.exe 85 PID 4788 wrote to memory of 3436 4788 msedge.exe 85 PID 4788 wrote to memory of 3436 4788 msedge.exe 85 PID 4788 wrote to memory of 3436 4788 msedge.exe 85 PID 4788 wrote to memory of 3436 4788 msedge.exe 85 PID 4788 wrote to memory of 3436 4788 msedge.exe 85 PID 4788 wrote to memory of 3436 4788 msedge.exe 85 PID 4788 wrote to memory of 3436 4788 msedge.exe 85 PID 4788 wrote to memory of 3436 4788 msedge.exe 85 PID 4788 wrote to memory of 3436 4788 msedge.exe 85 PID 4788 wrote to memory of 3436 4788 msedge.exe 85 PID 4788 wrote to memory of 3436 4788 msedge.exe 85 PID 4788 wrote to memory of 3436 4788 msedge.exe 85 PID 4788 wrote to memory of 3436 4788 msedge.exe 85 PID 4788 wrote to memory of 3436 4788 msedge.exe 85 PID 4788 wrote to memory of 3436 4788 msedge.exe 85 PID 4788 wrote to memory of 3436 4788 msedge.exe 85 PID 4788 wrote to memory of 3436 4788 msedge.exe 85 PID 4788 wrote to memory of 3436 4788 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f50379988920d3878813f2e010e20939_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9545846f8,0x7ff954584708,0x7ff9545847182⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,11103222054598167529,15331409201196118255,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,11103222054598167529,15331409201196118255,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,11103222054598167529,15331409201196118255,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,11103222054598167529,15331409201196118255,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,11103222054598167529,15331409201196118255,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,11103222054598167529,15331409201196118255,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 /prefetch:82⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,11103222054598167529,15331409201196118255,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,11103222054598167529,15331409201196118255,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,11103222054598167529,15331409201196118255,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,11103222054598167529,15331409201196118255,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,11103222054598167529,15331409201196118255,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,11103222054598167529,15331409201196118255,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1924 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
614B
MD5436c5115584aaf90bc89706143c54a2b
SHA131fa69a6b612609a71ec532b413fde02bdfe79ed
SHA25662275929bb0d3ef70ebfa9937717ffd126b787a1b4ac45fafa2475ff12587247
SHA5120db71d7bfca3ed223194625dcaf44b6ce8802ca5dd2c46a4df677f615e5f9876b3192b7ef74e65baef9568e21245ef916f11ceb52f2b14c67ad8c74652040eff
-
Filesize
5KB
MD5078468bfa5af3a0fe810d7af1f47f584
SHA1725b044a96b5ad1dc440e719af2a176058034f0f
SHA25673d67fa586fc5209862390a4abd1aa3f057bd84c8a8dfd31803e249873ff1ca5
SHA512247a0f7ab9dcb675e94f89c547a9970c6f38cd3fb55eb50faaf8c94de46c22ac399fcd91e0dcc0e1c9e4bade28d6c8d541693a99b09149860870cc3798021892
-
Filesize
6KB
MD5a987c06bf2ebb2135a1cd583141decc0
SHA1c45517bc6bf14c029ef153cd31d07b87f39619b8
SHA25635b6cff323b60d405968f21197a9d2b0c18e84ea93afdce154596cf814ad7783
SHA51209523f987c028decec0d3153e3b620d18bd7fef3bbc511ef770843ab9ee468ebaf4e583e86516d0990c5bcf6c96a4558684d2260c0f2301f94f203d0d38b9ec4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d1f843fd7dbfcfa9f93455327c982c8a
SHA1e1e517332edb47766519cb3c78df2a43225b80b3
SHA2566790b69133879f7f86e162eaf725290cef5654fa9afb4e431a84f5f8babd5261
SHA5121e4043434f7db645b1d99e11e7f4ee0d6e0fc1d09b6a7cdca0c5a2595fc6e269712d0c09cc75b560f484cf4d1c346a3d91d3c2e26930c3c065e2d1756d4e667c